Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2025, 14:40
General
-
Target
2025-04-02_5195e2e8f4b4159935e6e073b5374e73_amadey_smoke-loader.exe
-
Size
581KB
-
MD5
5195e2e8f4b4159935e6e073b5374e73
-
SHA1
2e436531d0c630daf2f78a9956ec349a8349585d
-
SHA256
553463b7f26cbb1dd837663bb1070e3e5855704135df7ce1aa8db1fcd2fee49b
-
SHA512
767afa7de3029a1499bee15ac4fe40d66f94b1e2b5adafdddbb6b250e59e6552d2d60acec91594af9205509692180aa2478f78458aca7cdd04fbd5a693344247
-
SSDEEP
6144:JajY1oC+/U8Vjlx4kk9HKda4L38c8hpdoSQbQFsrF1W/h84IrV7mMpH8zQW4jQwd:fOlx4kk9HKda4YJoSiQi4kVdcQzjk4
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation 2025-04-02_5195e2e8f4b4159935e6e073b5374e73_amadey_smoke-loader.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation idced.exe -
Executes dropped EXE 2 IoCs
pid Process 4600 idced.exe 1604 anqim.exe -
resource yara_rule behavioral1/memory/4380-0-0x0000000000400000-0x00000000004BF26D-memory.dmp upx behavioral1/files/0x000c0000000240a7-6.dat upx behavioral1/memory/4600-13-0x0000000000400000-0x00000000004BF26D-memory.dmp upx behavioral1/memory/4380-14-0x0000000000400000-0x00000000004BF26D-memory.dmp upx behavioral1/memory/4600-17-0x0000000000400000-0x00000000004BF26D-memory.dmp upx behavioral1/memory/4600-26-0x0000000000400000-0x00000000004BF26D-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-02_5195e2e8f4b4159935e6e073b5374e73_amadey_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language idced.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language anqim.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe 1604 anqim.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1604 anqim.exe Token: SeIncBasePriorityPrivilege 1604 anqim.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4380 wrote to memory of 4600 4380 2025-04-02_5195e2e8f4b4159935e6e073b5374e73_amadey_smoke-loader.exe 92 PID 4380 wrote to memory of 4600 4380 2025-04-02_5195e2e8f4b4159935e6e073b5374e73_amadey_smoke-loader.exe 92 PID 4380 wrote to memory of 4600 4380 2025-04-02_5195e2e8f4b4159935e6e073b5374e73_amadey_smoke-loader.exe 92 PID 4380 wrote to memory of 4840 4380 2025-04-02_5195e2e8f4b4159935e6e073b5374e73_amadey_smoke-loader.exe 93 PID 4380 wrote to memory of 4840 4380 2025-04-02_5195e2e8f4b4159935e6e073b5374e73_amadey_smoke-loader.exe 93 PID 4380 wrote to memory of 4840 4380 2025-04-02_5195e2e8f4b4159935e6e073b5374e73_amadey_smoke-loader.exe 93 PID 4600 wrote to memory of 1604 4600 idced.exe 111 PID 4600 wrote to memory of 1604 4600 idced.exe 111 PID 4600 wrote to memory of 1604 4600 idced.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-02_5195e2e8f4b4159935e6e073b5374e73_amadey_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-02_5195e2e8f4b4159935e6e073b5374e73_amadey_smoke-loader.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\idced.exe"C:\Users\Admin\AppData\Local\Temp\idced.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\anqim.exe"C:\Users\Admin\AppData\Local\Temp\anqim.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
338B
MD5e81fbcc3bc290aa87edaa1e9aa760a10
SHA10f7fb26af50fccfbcc9a2a7252a5fff8f69a31be
SHA2561009023288a32aa9d4b8c0e197691fee0ad001a98855f906c75d847da4084218
SHA51218522a98ed654de7ac8aa90705bc3cc74ca018ac351664ce79f0b5412ea5046a2d77bc66d6557c4f25005d5830b686e5c9c33902de312ff8cf7fdba2b549032d
-
Filesize
201KB
MD52fe0c1753c89ee4e58d12eac92ef3662
SHA19698d715ebfe5ca9683dc04a04e1197523f99cf3
SHA256ea4e83c7331e659d567879b2237d38d1398030f59af7930c24acb88356fed966
SHA5125daebdabc5862104fba6c079b60a61feee58487d59b9ecc376fd50029cb41709d26e436ba17fc9cdcd4666b0d348a418766f183cff6fd80019b22f67528a88b0
-
Filesize
512B
MD5b5f252796b7b598f4da2268a05548e71
SHA19c0e2aec340dbb8a55014b48b85067a000725d4a
SHA256c70b538f5e7e51f7ec78de102c58f1b5f78b0b4120285f740d4e920a5716c223
SHA5123090676660d41a0cbc7c406ec12c8d099d5b666ff91461125605fb21226577ba8ed322d0896f589a868edc434ee7451c56d498efb798c323461547b3340a8464
-
Filesize
581KB
MD5f08617c928e746eb58dc6762f4a8d5c3
SHA1b17c323d0076f40ff1f39a48923876bd05bcf716
SHA256e18c839871c8946e7d64b81a50a7711749aada1d7c0710c7e129f514a1243781
SHA5124c12c91ae45437cfe9302f4b67f24a2f34c4b2d270a737d78879fb2e97f6d0b967aa49244422c8413c21d864de092693b66aa042ec2338e7772e77aa1d7f95bf